足球竞猜app软件网络世界IT最佳实践 //m.banksfrench.com en - us 星期六,19月19日10:23:25 -0700 星期六,19月19日10:23:25 -0700 https://idge.staticworld.net/nww/networkworld510x510.png 足球竞猜app软件 m.banksfrench.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 足球竞猜app软件 m.banksfrench.com 796 288 NetBeez有助于缩小虚拟环境中问题的根源 2020年2月5日星期三13:40:00 -0800 琳达Musthaler 琳达Musthaler

Ryan Riffle is the network manager for an insurance firm with just under 2,000 employees. The company operates a primary data center, plus another for disaster recovery, to serve two major offices in the south-central US and smaller branches around the country. Three years ago, the company installed a software-defined network based on VMware NSX technology, and now more than 99% of the network operates in a virtual environment.

The flexibility of the software-defined network provides a lot of benefits. Riffle says the company was able to improve its security posture with micro-segmentation for business applications at the virtual layer. (The company does not allow use of its name for the appearance of endorsing any product or vendor.) What’s more, there is no longer a need to have physical third-party appliances that had to be managed differently from the virtual server environment. They were able to remove physical devices, including a hardware firewall, routers and load balancers.

To read this article in full, please click here

//m.banksfrench.com/article/3519869/netbeez-helps-narrow-down-root-causes-of-issues-in-virtual-environments.html#tk.rss_itbestpractices 网络监控 网络 虚拟化 VMware
SASE不仅仅是BioIVT的一个流行词 2019年11月12日星期二04:55:00 -0800 琳达Musthaler 琳达Musthaler //m.banksfrench.com/article/3453030/sase-is-more-than-a-buzzword-for-bioivt.html#tk.rss_itbestpractices 网络 安全 一种可以合法绕过中国防火长城的SD-WAN服务 2019年11月03日星期日21:00:00 -0800 琳达Musthaler 琳达Musthaler

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.

On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.

Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.

To read this article in full, please click here

//m.banksfrench.com/article/3451384/a-vpn-service-that-gets-around-the-great-firewall-of-china-legally.html#tk.rss_itbestpractices 网络 VPN SD-WAN 安全
Tokalabs软件定义的实验室自动化实验室试验台的配置 2019年10月20日星期日21:00:00 -0700 琳达Musthaler 琳达Musthaler

Network environments have become so complex that companies such as systems integrators, equipment manufacturers and enterprise organizations feel compelled to test their configurations and equipment in lab environments before deployment. Performance test labs are used extensively for quality, proof of concept, customer support, and technical sales initiatives. Labs are the perfect place to see how well something performs before it’s put into a production environment.

The primary challenge of running a test lab is the amount of time it takes to provision the test environments. A network lab infrastructure might include switches, routers, servers, virtual machines running on various server clusters, security services, cloud resources, software and so on. It takes considerable time to wire the configurations, physically build the desired test beds, login to each individual device and load the proper software configurations. Quite often, lab staffers spend more time on setup than they do on conducting actual tests.

To read this article in full, please click here

//m.banksfrench.com/article/3446816/tokalabs-software-defined-labs-automates-configuration-of-lab-test-beds.html#tk.rss_itbestpractices. 网络
准备好迎接IT、OT、网络和安全的融合 2019年8月16日星期五07:28:00 -0700 琳达Musthaler 琳达Musthaler

Most IT networking professionals are so busy with their day-to-day responsibilities that they don’t have time to consider taking on more work. But for companies with an industrial component, there’s an elephant in the room that is clamoring for attention. I’m talking about the increasingly common convergence of IT and operational technology (OT) networking and security.

Traditionally, IT and OT have had very separate roles in an organization. IT is typically tasked with moving data between computers and humans, whereas OT is tasked with moving data between “things,” such as sensors, actuators, smart machines, and other devices to enhance manufacturing and industrial processes. Not only were the roles for IT and OT completely separate, but their technologies and networks were, too.

To read this article in full, please click here

//m.banksfrench.com/article/3432132/get-ready-for-the-convergence-of-it-and-ot-networking-and-security.html#tk.rss_itbestpractices 安全 网络 网络管理
钢化网络简化了安全网络连接和微分割 2019年7月1日星期一04:52:00 -0700 琳达Musthaler 琳达Musthaler

The TCP/IP protocol is the foundation of the internet and pretty much every single network out there. The protocol was designed 45 years ago and was originally only created for connectivity. There’s nothing in the protocol for security, mobility, or trusted authentication.

The fundamental problem with TCP/IP is that the IP address within the protocol represents both the device location and the device identity on a network. This dual functionality of the address lacks the basic mechanisms for security and mobility of devices on a network.

This is one of the reasons networks are so complicated today. To connect to things on a network or over the internet, you need VPNs, firewalls, routers, cell modems, etc. and you have all the configurations that come with ACLs, VLANs, certificates, and so on. The nightmare grows exponentially when you factor in internet of things (IoT) device connectivity and security. It’s all unsustainable at scale.

To read this article in full, please click here

//m.banksfrench.com/article/3405853/tempered-networks-simplifies-secure-network-connectivity-and-microsegmentation.html#tk.rss_itbestpractices 网络安全 安全 SDN
Teridion进入MNS市场支持企业广域网 2019年5月29日星期三13:16:00 -0700 琳达Musthaler 琳达Musthaler

A few months ago, I wrote about the managed network services (MNS) market as the evolutionary direction of the network carrier. One of the companies that plays in this space is Teridion, with a service called Teridion for Enterprise. It’s a global WAN service with some unique capabilities to support performance and reliability that enterprises can really appreciate.

Teridion for Enterprise is a cloud-centric solution all the way. The network is built in the cloud, and customers use commodity edge devices such as SD-WAN appliances or Cisco ISR boxes to connect. (Click here to read about a Cisco-Teridion alliance.) Customers request services, make changes and set policies through an easy and contemporary user interface; they pay only for the capacity they use; and all maintenance and management is completely handled by Teridion.

To read this article in full, please click here

//m.banksfrench.com/article/3398939/teridion-s-entry-in-the-mns-market-supports-enterprise-wide-area-networking.html#tk.rss_itbestpractices 网络
Allied Telesis将其网络业务重点转向了美国市场 2019年5月2日星期四08:38:00 -0700 琳达Musthaler 琳达Musthaler

I recently had the opportunity to talk to Mark Wutzke, chief solution architect with Allied Telesis, to learn about the company’s smart networking offerings. Perhaps you, like me, don’t know much about this networking company, though it’s been in business since 1987. That might be because the global company, until recently, has focused its efforts outside the U.S. However, that focus is beginning to change, so I wanted to learn what the company brings to the table that enterprises would be interested in.

First, a little background on the company. Allied Telesis is headquartered in both Japan and the U.S. The company has global R&D centers and manufactures its own products. Among the products are intelligent switches and stackable chassis, industrial switches, wireless solutions, firewalls and routers, optics, NICs and media converters—basically end-to-end solutions from edge to core for LAN, WLAN and WAN. In addition, Allied Telesis writes its own operating system software for its equipment, as well as the network management software that provides many of the smart networking features the company is touting today.

To read this article in full, please click here

//m.banksfrench.com/article/3392800/allied-telesis-turns-its-networking-focus-to-the-us-market.html#tk.rss_itbestpractices 网络 网络管理 网络安全 无线网络
超越SD-WAN: VMware对网络边缘的愿景 2019年4月8日星期一07:54:00 -0700 琳达Musthaler 琳达Musthaler

VeloCloud is now a Business Unit within VMware since being acquired in December 2017. The two companies have had sufficient time to integrate their operations and fit their technologies together to build a cohesive offering. In January, Neal Weinberg provided an overview of where VMware is headed with its reinvention. Now let’s look at it from the VeloCloud SD-WAN perspective.

I recently talked to Sanjay Uppal, vice president and general manager of the VeloCloud Business Unit. He shared with me where VeloCloud is heading, adding that it’s all possible because of the complementary products that VMware brings to VeloCloud’s table.

To read this article in full, please click here

//m.banksfrench.com/article/3387641/beyond-sd-wan-vmwares-vision-for-the-network-edge.html#tk.rss_itbestpractices VMware SD-WAN 网络 5克
元网络将用户安全构建到其网络即服务中 2019年4月1日星期一06:40:00 -0700 琳达Musthaler 琳达Musthaler

Network-as-a-Service (NaaS) is growing in popularity and availability for those organizations that don’t want to host their own LAN or WAN, or that want to complement or replace their traditional network with something far easier to manage.

With NaaS, a service provider creates a multi-tenant wide area network comprised of geographically dispersed points of presence (PoPs) connected via high-speed Tier 1 carrier links that create the network backbone. The PoPs peer with cloud services to facilitate customer access to cloud applications such as SaaS offerings, as well as to infrastructure services from the likes of Amazon, Google and Microsoft. User organizations connect to the network from whatever facilities they have — data centers, branch offices, or even individual client devices — typically via SD-WAN appliances and/or VPNs.

To read this article in full, please click here

//m.banksfrench.com/article/3385531/meta-networks-builds-user-security-into-its-network-as-a-service.html#tk.rss_itbestpractices 网络安全 安全 网络
软件定义的周长带来了对多云应用程序、网络资源的可信访问 2019年3月11日星期一11:55:00 -0700 琳达Musthaler 琳达Musthaler

Many companies today have a hybrid approach to their networking and IT infrastructure. Some elements remain in an on-premise data center, while other portions have gone to the cloud and even to multi-cloud. As a result, the network perimeter is permeable and elastic. This complicates access requirements at a time when it’s more important than ever to enable accessibility while preventing unauthorized access to applications and data.

To reduce risk, some organizations are applying a zero-trust strategy of “verification before trust” by incorporating stronger, stateful user and device authentication; granular access control; and enhanced segmentation no matter where the applications and resources reside.

To read this article in full, please click here

//m.banksfrench.com/article/3359363/software-defined-perimeter-brings-trusted-access-to-multi-cloud-applications-network-resources.html#tk.rss_itbestpractices 网络安全 安全 混合云 云计算
托管网络服务如何发展以简化全局WAN 2019年2月20日星期三07:06:00 -0800 琳达Musthaler 琳达Musthaler

Fundamentally, the way that carriers (i.e. telcos) deliver managed network services hasn’t changed in decades. The core architecture of this network, known as hub and spoke, consists of branches talking to the data center over a managed network with a separate firewall in the middle. However, this type of legacy WAN can’t support today’s business needs, which include a seminal shift to the cloud, as well as mobile users that need network access from anywhere, not just from the branch.

Yishay Yovel, vice president of market strategy at Cato Networks, has followed the carriers’ dilemma for years. According to Yovel, there are numerous catalysts to this evolutionary change in the managed network services market.

To read this article in full, please click here

//m.banksfrench.com/article/3342202/how-managed-network-services-are-evolving-to-simplify-the-global-wan.html#tk.rss_itbestpractices 网络管理 网络 虚拟化
为托管数据中心计划的软件定义连接2020欧洲杯预赛 2019年2月8日星期五05:35:00 -0800 琳达Musthaler 琳达Musthaler

Gartner predicts that by 2025, 80 percent of enterprises will migrate entirely away from their on-premises data centers. Instead they’ll follow the current trend of moving workloads to colocation, hosting and the cloud, leading them to shut down their traditional data centers.

I’m sure that colocation centers look forward to the growth in business, but the growth also means the colocation data centers need to become more agile, scalable, and flexible. This is absolutely critical to their business model viability, but the challenge to get there is greater than ever.

Colocation providers have long benefitted from offering cross-connect and IT services, as well as Layer 2 WAN connectivity. However, these traditional offerings really aren't meeting the emerging demands from enterprise tenants who want more integrated, more secure and more automated networking solutions. As workloads move across different environments, such as SaaS and public clouds, there are management and operational challenges for colocation providers who are now being asked to support a more diverse portfolio of connectivity solutions.

To read this article in full, please click here

//m.banksfrench.com/article/3339558/software-defined-connectivity-planned-for-colocation-data-centers.html#tk.rss_itbestpractices SDN 2020欧洲杯预赛 云计算 2020欧洲杯预赛数据中心管理
SD-WAN如何改进您的安全策略 2019年1月25日星期五10:54:00 -0800 琳达Musthaler 琳达Musthaler

Data breaches and security threats are a top concern among IT leaders, yet it’s harder than ever to hire skilled security professionals. That has organizations looking for ways to more easily improve their security strategy. One option is to implement a software-defined WAN (SD-WAN).

I recently talked with Hamza Seqqat, director of solutions architecture at Apcela, to get his take on how SD-WAN affects security strategy. Seqqat helps enterprise organizations redefine their wide-area networks to accommodate the growing use of cloud-based applications and services. In our discussion, he outlined four areas where SD-WAN offers new security benefits.

To read this article in full, please click here

//m.banksfrench.com/article/3336483/how-sd-wan-can-improve-your-security-strategy.html#tk.rss_itbestpractices SD-WAN 网络 安全 网络安全
Oculeus反欺诈提供保护免受电信系统滥用 星期五,2019年1月11日08:46:00 -0800 琳达Musthaler 琳达Musthaler

When most enterprise companies worry about having their systems hacked by attackers, the main concern is for the enterprise networks. Few companies consider that their phone systems may be vulnerable to hacking resulting in costly toll fraud. Nevertheless, the practice of hacking into corporate PBX systems and injecting fraudulent calls over the network is causing billions of dollars in damage worldwide every year.

Enterprise companies use modern PBX (private branch exchange) systems to run their communications. A PBX switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. Modern PBX systems work on the Session Initiation Protocol (SIP), which is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications.

To read this article in full, please click here

//m.banksfrench.com/article/3332684/oculeus-anti-fraud-offering-protects-against-telecom-system-abuse.html#tk.rss_itbestpractices 电信 安全
Netsurion简化了网络和安全挑战 2018年12月19日星期三11:17:00 -0800 琳达Musthaler 琳达Musthaler

The disciplines of networking, security and regulatory compliance are challenges for all organizations, but especially so for small and medium-sized businesses (SMBs) for a variety of reasons.

A primary challenge is in implementing technology solutions, most of which are point solutions that operate in silos. This leads to “swivel chair” operations where networking and security professionals have to consult multiple separate consoles to keep tabs on how well everything is performing and whether cyber threats are bringing risk to the business. The lack of integration of the siloed solutions can leave gaps in coverage and cause extra work for those in charge of the network.

To read this article in full, please click here

//m.banksfrench.com/article/3329539/netsurion-eases-networking-and-security-challenges.html#tk.rss_itbestpractices 网络安全 网络监控 网络管理 网络
Itential让组织走上了通往现代网络的道路 2018年11月7日星期三07:30 -0800 琳达Musthaler 琳达Musthaler

In the realm of enterprise computing, we have already automated the management and orchestration of software-defined compute and storage resources. Need another server or more storage capacity? Those virtual resources can be created in mere minutes — and without intervention from a human to initiate or manage the process.

Need changes to the network, such as a router reconfiguration? Well, that’s going to take a lot of time and effort from a range of humans. Even something as simple as an update to a DNS or IPAM server can take three to five days to complete. A port turn-up can take just as long — not because any physical action takes that much time, but because the workflow of all the human reviews and approvals takes time.

To read this article in full, please click here

//m.banksfrench.com/artence-puts-orgorizations-on-the-patt-to-the-modern-network.html#tk.rss_itbestpractics. 网络 SDN 网络管理
NetBeez从用户的角度执行活动网络监视 2018年9月25日,星期二05:46:00 -0700 琳达Musthaler 琳达Musthaler

It’s a fairly common scenario. An end user calls the help desk about a problem he’s experiencing. He might say, “I can't access the inventory application.” The worker has no idea why he can't get to the application today when it worked fine yesterday. The help desk consultant collects the relevant information for the ticket, which then gets escalated to the network operations center that is the control center for the enterprise.

The technician assigned to the ticket doesn't know if this is a true network problem, an application problem, or even something that is specific to that user's workstation or environment. Narrowing the possible causes of the problem will require some investigation using various toolsets. Traditional network monitoring tools can tell if there’s anything wrong with a server, router, or switch on that user’s network segment. If those major components are fine, the hunt for the root cause gets underway. This can be time consuming in the absence of user-specific metrics.

To read this article in full, please click here

//m.banksfrench.com/article/3307874/netbeez-performs-active-network-monitoring-from-the-user-perspective.html#tk.rss_itbestpractices 网络监控 网络 网络管理
Apcela优化了Office 365的性能,提高了用户的工作效率 2018年8月13日星期一05:43:00 -0700 琳达Musthaler 琳达Musthaler

More than 120 million Microsoft Office accounts have moved from on-premises to the cloud since the launch of Microsoft Office 365. Many of those accounts belong to users in large enterprises that weren’t fully prepared for the transition. The fact is as many as 30 to 40 percent of enterprises struggle with some level of application performance as they make the shift to cloud.

Some of the signs of poor performance (and the source of users’ frustration) include Outlook responding slowly when the user tries to open messages, VoIP calls over Skype for Business having rough spots, and documents being slow to open, close and save in Word. Performance problems in the Office applications manifest in many other ways, as well.

To read this article in full, please click here

//m.banksfrench.com/article/3297061/apcela-optimizes-office-365-performance-improving-user-productivity.html#tk.rss_itbestpractices 应用程序性能管理 网络
NS1的私有DNS支持现代应用程序、DevOps等 2018年7月30日星期一02:30:00 -0700 琳达Musthaler 琳达Musthaler

We all know and appreciate DNS as the domain name system that maps names like Networkworld.com to the IP address that a browser actually connects to in order to get content from a website. DNS is obviously a foundational piece of the internet. However, the technology is a bit stale and needs a refresh to keep up with the times.

Legacy DNS is a simple protocol. It is essentially a phonebook that maps a domain name to an IP address. Most commercial DNS products or services in the market today are based on an open-source software product called BIND put out by the Internet Software Consortium. The name BIND stands for “Berkeley Internet Name Daemon” because the software originated in the early 1980s at the University of California at Berkeley. Not much about the DNS protocol has changed since then.

To read this article in full, please click here

//m.banksfrench.com/article/3293006/ns1s-private-dns-enables-modern-applications-devops-and-more.html#tk.rss_itbestpractices 互联网 网络
OPAQ能从云端实现全面的网络安全 星期二,2018年7月10日10:46:00 -0700 琳达Musthaler 琳达Musthaler

Today’s threat landscape has led organizations to defend their networks with numerous point solutions, most of which are complex and require significant attention to operations and ongoing maintenance. While large enterprises often have sufficient skilled resources to support the security infrastructure, small- to medium-sized businesses sometimes struggle in this area.

For the SMB market in particular, Network Security-as-a-Service is an attractive offering. It allows companies to get the very best security technology at an affordable price point while having someone else maintain the complex infrastructure.

This has given rise to a genre of service provider that builds its own network backbone in the cloud and embeds network security as an integral service. More and more players are starting to offer this kind of service. They generally start with a global network backbone and software-defined wide-area networking (SD-WAN), add a full security stack, and connect to various cloud services from Amazon, Google, Microsoft, etc. Customers connect their data centers, branches, end users, and cloud apps to this network, and away they go. It’s networking, plus network security, all in one place, and all managed as a service.

To read this article in full, please click here

//m.banksfrench.com/article/3287101/opaq-enables-total-network-security-from-the-cloud.html#tk.rss_itbestpractices 网络安全 萨斯 网络 SD-WAN
Pulse安全VPN增强,更好地支持混合IT环境 2018年7月3日星期二06:40:00 -0700 琳达Musthaler 琳达Musthaler

The workplace is changing rapidly as employees embrace mobility, applications are in the cloud, and Internet of Things (IoT) devices are instrumented for continuous connectivity — and this is affecting how organizations must think about secure access. Regardless of the scenario, organizations want solutions that deliver better productivity for whomever (or whatever) is connecting, a consistent user experience, compliance with corporate policies and regulatory requirements, and strong end-to-end security.

This is the playing field for Pulse Secure, a company that has built a broad portfolio of access products and services that are available as a unified platform. Pulse Secure has considered practically every use case and has built a range of solutions to solve the secure connectivity challenges that IT organizations face. The company claims to have more than 20,000 customers and a presence in 80 percent of global enterprises — maybe even yours.

To read this article in full, please click here

//m.banksfrench.com/article/3287046/pulse-secure-vpn-enhanced-to-better-support-hybrid-it-environments.html#tk.rss_itbestpractices 网络安全 安全 2020欧洲杯预赛 混合云
Nexthink的数字体验管理平台可以快速解决性能问题 2018年6月28日星期四09:30:00 -0700 琳达Musthaler 琳达Musthaler

Any organization that has even a modest level of IT infrastructure does IT service monitoring (ITSM) to ensure that everything is operating within performance mandates codified in service level agreements (SLAs). If the IT organization is meeting its SLAs, it’s assumed that the experience the employee has interacting with this infrastructure is good. But that isn’t always the case, and the IT group might not even be aware.

For instance, an enterprise application might be working just fine for most users, but for one or a few users in particular, it could be especially slow. Unless those people call the help desk to complain, who would ever know that they are suffering? Sometimes people just accept that some aspect of IT functions poorly, and they carry on the best they can, even if it affects their productivity.

To read this article in full, please click here

//m.banksfrench.com/article/3285646/nexthinks-digital-experience-management-platform-quickly-solves-performance-problems.html#tk.rss_itbestpractices 应用程序性能管理 基础设施 网络管理 软件
Teridion支持性能更高、响应更快的SaaS应用程序 星期五,2018年6月22日07:33:00 -0700 琳达Musthaler 琳达Musthaler

Up until the advent of Software as a Service (SaaS), almost every business-critical application ran inside an enterprise’s own data center. The company had complete control over the performance of the application and could use technologies such as MPLS and techniques like WAN optimization to ensure that users across the enterprise always had a good experience with the application.

That’s no longer the case now that SaaS has become the de facto delivery model for core business applications today. In effect, the cloud is the new data center, and the internet is the new LAN. The most business-critical network between the end user and the application is not the corporate LAN but the public internet, which itself is a big collection of networks. When the internet is what sits between the end user and the SaaS application, the company depending on that application may no longer have good performance, reliability, and control.

To read this article in full, please click here

//m.banksfrench.com/article/3284285/teridion-enables-higher-performing-and-more-responsive-saas-applications.html#tk.rss_itbestpractices 萨斯 云计算 软件
卡托网络将威胁狩猎作为一种服务添加到其网络中 2018年6月04日星期一03:15:00 -0700 琳达Musthaler 琳达Musthaler

Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. According to Market Research Future, NaaS is expected to become a US $126 billion market by 2022, sustaining an annual growth rate of 28.4 percent.

One of the key benefits of cloud-based networking is increased security for applications and data. Given that the traditional perimeter of on-premise networks has been decimated by mobile and cloud computing, NaaS builds a new perimeter in the cloud. Now it’s possible to unify all traffic – from data centers, branch locations, mobile users, and cloud platforms – in the cloud. This means an enterprise can set all its security policies in one place, and it can push traffic through cloud-based security functions such as next-generation firewall, secure web gateway, advanced threat protection, and so on.

To read this article in full, please click here

//m.banksfrench.com/article/3276319/cato-networks-adds-threat-hunting-to-its-network-as-a-service.html#tk.rss_itbestpractices 网络安全 安全 网络管理
Asigra发展了备份/恢复以满足安全性和遵从性需求 周一,2018年5月21日07:36:00 -0700 琳达Musthaler 琳达Musthaler

As backup and recovery products and solutions evolve, they are beginning to intersect with security and compliance. Online backup and recovery software company Asigra has announced a new version of its software that addresses the risks posed by ransomware and non-compliance with Article 17 of the European Union’s General Data Protection Regulation (GDPR). Both should be a concern for organizations of all sizes, from global enterprises on down to small/medium businesses.

Let’s take a look at the new capabilities that Asigra is bringing to market with the version 14 release of its Cloud Backup software, and why these capabilities are an important evolution in backup and recovery.

To read this article in full, please click here

//m.banksfrench.com/article/3274549/asigra-evolves-backup-recovery-to-address-security-compliance-needs.html#tk.rss_itbestpractices 备份和恢复 安全 灾难恢复
VMware和VeloCloud公布了他们的网络和安全策略 星期五,2018年5月4日09:30:00 -0700 琳达Musthaler 琳达Musthaler

It’s been a few months since VMware closed its acquisition of VeloCloud, a prominent SD-WAN provider. In that time, the two companies have worked to integrate their products, and recently they announced a unified strategy called the Virtual Cloud Network.

The strategy fully supports the migration of applications and data out of the enterprise data center to the cloud and to branches — and with IoT, pretty much anything can be considered a branch today, as VeloCloud claims to have a customer with ocean-going ships as branches. The result is that many enterprises are in a position where their applications are everywhere, and their data is everywhere. This has profound implications on the network that needs to support all of this.

To read this article in full, please click here

//m.banksfrench.com/article/3269769/vmware-and-velocloud-announce-their-networking-and-security-strategy.html#tk.rss_itbestpractices 网络 安全 SD-WAN VMware
在物联网世界中,通用数据库不能满足需求 2018年4月16日星期一10:14:00 -0700 琳达Musthaler 琳达Musthaler

We live in an age of instrumentation, where everything that can be measured is being measured so that it can be analyzed and acted upon, preferably in real time or near real time. This instrumentation and measurement process is happening in both the physical world, as well as the virtual world of IT.

For example, in the physical world, a solar energy company has instrumented all its solar panels to provide remote monitoring and battery management. Usage information is collected from a customers’ panels and sent via mobile networks to a database in the cloud. The data is analyzed, and the resulting information is used to configure and adapt each customer’s system to extend the life of the battery and control the product. If an abnormality or problem is detected, an alert can be sent to a service agent to mitigate the problem before it worsens. Thus, proactive customer service is enabled based on real-time data coming from the solar energy system at a customer’s installation.

To read this article in full, please click here

//m.banksfrench.com/article/3268838/in-the-iot-world-general-purpose-databases-cant-cut-it.html#tk.rss_itbestpractices 物联网 2020欧洲杯预赛 大数据
网络AS-A-A-Service:现代解决当今的网络挑战 2018年4月5日星期四08:51:00 -0700 琳达Musthaler 琳达Musthaler

Traditional networking architectures over the past two decades or so prescribe that the hub of the network be build around a specific location, such as a data center or a company’s headquarters building.

This location houses most of the equipment for compute, storage, communications, and security, and this is where enterprise applications are traditionally hosted. For people in branch and other remote locations, traffic is typically backhauled to this hub before going out to other locations, including to the cloud.

[ Don’t miss customer reviews of top remote access tools. | Get daily insights by signing up for Network World newsletters. ]

To read this article in full, please click here

//m.banksfrench.com/article/3268062/network-as-a-service-a-modern-solution-to-todays-networking-challenges.html#tk.rss_itbestpractices 网络 移动 安全
Mist的无线网络让公司能够个性化用户体验 2017年7月5日星期三04:30:00 -0700 琳达Musthaler 琳达Musthaler

The Wi-Fi networks of today were architected more than a decade ago. That even predates the iPhone, which ushered in the era of mobility. These old Wi-Fi architectures aren’t ready to handle the vast number of mobile devices that want to connect to wireless networks today.

What’s more, these networks aren’t able to put any focus on what users experience when they are connected.

The old generation of Wi-Fi networks are a hindrance to businesses that want to increase customer engagement over ubiquitous mobile devices. For example, restaurants and retail stores would like to capture customers’ attention by offering real-time discounts or coupons when customers enter or walk by the establishment. Doing so requires the use of several technologies that old wireless networks just can’t support at scale.

To read this article in full, please click here

//m.banksfrench.com/article/3205205/mists-wireless-network-lets-companies-personalize-the-user-experience.html#tk.rss_itbestpractices 移动 无线网络 网络